Vulnerabilities > CVE-2006-3389 - SQL Injection vulnerability in Wordpress 2.0.3
Attack vector
NETWORK Attack complexity
LOW Privileges required
NONE Confidentiality impact
PARTIAL Integrity impact
NONE Availability impact
NONE Summary
index.php in WordPress 2.0.3 allows remote attackers to obtain sensitive information, such as SQL table prefixes, via an invalid paged parameter, which displays the information in an SQL error message. NOTE: this issue has been disputed by a third party who states that the issue does not leak any target-specific information.
Vulnerable Configurations
Part | Description | Count |
---|---|---|
Application | 1 |
Nessus
NASL family | Gentoo Local Security Checks |
NASL id | GENTOO_GLSA-200608-19.NASL |
description | The remote host is affected by the vulnerability described in GLSA-200608-19 (WordPress: Privilege escalation) The WordPress developers have confirmed a vulnerability in capability checking for plugins. Impact : By exploiting a flaw, a user can circumvent WordPress access restrictions when using plugins. The actual impact depends on the configuration of WordPress and may range from trivial to critical, possibly even the execution of arbitrary PHP code. Workaround : There is no known workaround at this time. |
last seen | 2020-06-01 |
modified | 2020-06-02 |
plugin id | 22218 |
published | 2006-08-14 |
reporter | This script is Copyright (C) 2006-2019 Tenable Network Security, Inc. |
source | https://www.tenable.com/plugins/nessus/22218 |
title | GLSA-200608-19 : WordPress: Privilege escalation |
code |
|
References
- http://secunia.com/advisories/20928
- http://secunia.com/advisories/21447
- http://security.gentoo.org/glsa/glsa-200608-19.xml
- http://securityreason.com/securityalert/1187
- http://www.securityfocus.com/archive/1/438942/100/0/threaded
- http://www.securityfocus.com/archive/1/439031/100/0/threaded
- http://www.securityfocus.com/archive/1/439062/100/0/threaded
- http://www.securityfocus.com/archive/1/440127/100/0/threaded
- http://www.securityfocus.com/bid/18779
- http://www.vupen.com/english/advisories/2006/2661